189 | -- | 196 | Xuelian Yang. Iterative learning feedback control of network inverse system |
197 | -- | 204 | Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif. The quality factor for detecting node isolation attack in mobile ad hoc networks using OLSR protocol |
205 | -- | 218 | Amrit Suman, Chiranjeev Kumar, Preetam Suman. Advance routing strategy for VANETs |
219 | -- | 231 | Yanli Li, Xiaonan Wang. Position-related content acquisition for CCM |
232 | -- | 239 | Junjun Liu, Jian Wu, Lanzhong Guo. Construction of emergency dispatching and controlling platform for multi-elevator in cloud computing |
240 | -- | 247 | Jia Chen, Yingkai Miao. Study on network security intrusion target detection method in big data environment |
248 | -- | 255 | Daqin Wu, Haiyan Hu, Zheng Xie. Design of hole repair system for wireless sensor networks based on triangle partition |